In January of 2007, I became 50% owner of Financial Calculators, Inc., after buying out one of the two partners of the company. The other partner, Chris Brockbank, and I also created a new company called CalcXML, LLC. Both of these companies provide over 100 online financial calculators in 11 categories to the financial services industry, including large portals (Yahoo and AOL), insurance companies (Mutual of Omaha, Guardian Life, Jackson National, National Life), banks (Wells Fargo, Everbank, First Horizon) and other financial service companies (LendAmerica.com, Experian, etc.)
Financial Calculators, Inc. provides our legacy calculators where we host the input and output pages along with the calculator engines themselves. Clients have the ability to customize the look-and-feel, add their own logo, etc. and then put hyperlinks on their web site to access the calculators.
CalcXML, LLC provides our new XML web service based calculators. Clients have full control over the look-and-feel of the input and output pages and can host them on their own servers, making behind-the-scenes web service calls to our calc engines for the calculator results. As the first and only calculator company to offer such a solution, we have had many sales opportunities this year.
Tuesday, August 28, 2007
Monday, June 04, 2007
Page hijacking
We recently suffered a page hijacking incident on our servers. The symptoms were that when someone browsed to one of our pages, they would be redirected to some other page. It took us some time to figure out how it was happening. We finally stumbled upon a post on a forum that helped us solve the problem. I thought I'd include a link to that post here to help others find it if they happen to find my blog post. This post describes exactly what was happening to us and provides a solution to the problem.
http://www.webmasterforums.com/windows-web-security/5612-page-being-hijacked.html
The solution is on the 3rd page. If for some reason that link is gone or does not work, I copied it's contents to here:
http://www.whitesandsolutions.com/PageHijacked.rtf
Here are some keywords that someone may use to find this post:
c:\boot.vbs, mm.exe, nb88, d99_temp, ad.js, coon.js
http://www.webmasterforums.com/windows-web-security/5612-page-being-hijacked.html
The solution is on the 3rd page. If for some reason that link is gone or does not work, I copied it's contents to here:
http://www.whitesandsolutions.com/PageHijacked.rtf
Here are some keywords that someone may use to find this post:
c:\boot.vbs, mm.exe, nb88, d99_temp, ad.js, coon.js
Subscribe to:
Posts (Atom)